Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,206,529 papers from all fields of science
Search
Sign In
Create Free Account
Code integrity
Code integrity is a measurement used in software testing. It measures the how high is the source code's quality when it is passed on to the QA, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Ensuring Software Integrity in IoT Devices
C. Echard
2017
Corpus ID: 55323687
This paper will review the available literature covering topics relevant to ensuring software integrity of the boot image and…
Expand
2016
2016
Addressing the security challenges of using containers
Michael A. Pittenger
Network Security
2016
Corpus ID: 3442364
2015
2015
Personal Information Leaks with Automatic Login in Mobile Social Network Services
Jongwon Choi
,
Haehyun Cho
,
J. Yi
Entropy
2015
Corpus ID: 11616851
To log in to a mobile social network service (SNS) server, users must enter their ID and password to get through the…
Expand
Review
2012
Review
2012
A KNOWLEDGE BASED APPROACH FOR THE GENERALIZATION OF LINEAR FEATURES
Andriani Skopeliti
,
L. Tsoulos
2012
Corpus ID: 10509178
Andriani Skopeliti 1 Lysandros Tsoulos 2 Cartography Laboratory, Faculty of Rural and Surveying Engineering National Technical…
Expand
2008
2008
Mechanisms to Provide Integrity in SCADA and PCS devices ∗
Aakash Shah
,
A. Perrig
,
B. Sinopoli
2008
Corpus ID: 14485275
Supervisory Control and Data Acquisition (SCADA) systems control and monitor critical infrastructure such as natura l gas, oil…
Expand
2007
2007
Microarchitectural Support for Program Code Integrity Monitoring in Application-specific Instruction Set Processors
Yunsi Fei
,
Z. Shi
Design, Automation & Test in Europe Conference…
2007
Corpus ID: 334260
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At…
Expand
2006
2006
Data and code integrity in Grid environments
R. Akimana
,
O. Markowitch
2006
Corpus ID: 13953596
In a large distributed system such as the Grid, ensuring data integrity is of particular importance. Since in a same network…
Expand
Review
1998
Review
1998
Security concepts and implementation in the Ara mobile agent system
H. Peine
Proceedings Seventh IEEE International Workshop…
1998
Corpus ID: 7454544
We describe the security architecture of the Ara mobile agent platform, after reviewing the relevant aspects of comparable…
Expand
1991
1991
Algorithm- sequenced access control
J. Domingo-Ferrer
Computers & security
1991
Corpus ID: 14077512
1987
1987
Source code security: checklist for managers
Jon Corelis
SGSC
1987
Corpus ID: 52869049
Although computer security is usually thought of as data security, the protection of the executable software which creates and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE